Free Cyber Security PDF Library: From Basics to Advanced
Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.
Ethical Hacking
Description: Download free Ethical Hacking PDF. Learn hacktivism, penetration testing, cyber-jihad forums, and legal cases. Perfect for cybersecurity students and beginners.
Cyber Security for Beginners
Description: Practical cybersecurity guide for beginners: actionable steps on passwords, phishing, encryption, devices, and basic policies for individuals and teams.
Security of Ubiquitous Computing Systems
Description: Explore essential research papers on cryptography, covering attacks, protocols, and security measures. A must-read for enthusiasts and professionals.
Fundamentals of Cryptology
Description: Download free Fundamentals of Cryptology PDF. Learn encryption methods, cryptographic algorithms, security protocols, and key management.
Handbook of Applied Cryptography
Description: Comprehensive overview of applied cryptography: algorithms, protocols, and implementation guidance for students and professionals seeking practical mastery.
Security Vulnerabilities of Mobile Devices
Description: Practical strategies to secure mobile devices from malware, sandbox escapes, OTA interception, side-channel and USB attacks, with hands-on mitigation guidance.
Filtering Out Spam
Description: Practical guide to filtering spam with Procmail and regular expressions—email recipes, string processing, Base64 and HTML handling, and hands-on projects.
Bots, Botnets, and the DDoS Attacks
Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.
Malware: Viruses and Worms
Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!
Attacks for Cyber Espionage with Trojans
Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.
Web Security: Cross-Site Scripting and Other Browser-Side Exploits
Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.
Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack
Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.
The Dictionary and the Rainbow-Table Attack
Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.
Port and Vulnerability Scanning
Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.
Buffer Overflow Attack
Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.
Finite Fields (PART 4) - Finite Fields of the Form GF(2n)
Description: Practical guide to GF(2^n) arithmetic: bitwise addition, shift-and-XOR multiplication, modular polynomial reduction, inversion methods, and code examples.
Finite Fields (PART 3) - Polynomial Arithmetic
Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.
Finite Fields (PART 2) - Modular Arithmetic
Description: Download free Finite Fields - Modular Arithmetic PDF. Learn modular operations, multiplicative inverses, GCD calculations, and field properties.
Finite Fields (PART 1) - Groups, Rings, and Fields
Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.
DNS and the DNS Cache Poisoning Attack
Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.